SlideShare a Scribd company logo
1 of 19
Download to read offline
Why Should I Care About Mobile Security
Jasmine Noel, Sr. Product Marketing Manager, Mobile
Agenda
Why are cyber attackers interested in your mobile

devices?
How can my device be hacked?
How can I protect myself?

2
What mobile apps did you use to
get to work today?

Alarm/Clock

Weather

Transportation/
Traffic

3
You are not alone!

46B
mobile apps
downloaded in
2012 –
Gartner1

2017
more app
downloads
than stars

400B
stars in our
galaxy

1http://www.gartner.com/newsroom/id/2153215

4
Top Traffic/Transportation Apps
60% have location permissions or monitor my
device’s location
46% interact with other types of Sensitive Data

26% have access to my contacts

Analysis conducted by Veracode Mobile App Reputation Service (MARS)
5
http://www.veracode.com/blog/2013/08/developers-guide-to-buildingsecure-mobile-applications-infographic/
My Apps are My Digital Life
http://www.veracode.com/blog/2013/08/developers-guide-to-building-securemobile-applications-infographic/
http://www.veracode.com/blog/2012/11/identity-theft-keeping-safe-in-anonline-world-infographic/
But I’ve never lost my phone!
How Attacks Can Happen

MY
BANK
APP

Export
data

OTHER APP
Services

MY
OTHER
APP

Stored
transaction
number

BANK
Services

Read
SMS
logs

No control over how
or if this data is used
https://info.veracode.com/webinar-what-are-employees-mobileapps-doing-behind-your-back.html
How Attacks Can Happen

Check for
“updates”

Malicious
Code
Servers

Install
rootkit
exploits

MY
COOL
APP
Secretly
become a
super user

https://info.veracode.com/webinar-what-are-employees-mobileapps-doing-behind-your-back.html
http://www.veracode.com/blog/2012/10/why-you-should-care-about-mobilesecurity-infographic/
Application Passwords
DO

DO NOT

Use at least one
special character

No words found in a
dictionary

Use at least one
number

Family names, birth
city, sports teams or
guessable words

Try using password
generators and vaults

P@ssw0rd
Veracode!

Guessable words with
changed letters
http://www.veracode.com/blog/2013/05/appsec-and-your-kids-infographic/
http://www.veracode.com/blog/2013/05/appsec-and-your-kids-infographic/
http://www.veracode.com/blog/2013/05/appsec-and-your-kids-infographic/
Summary
 Why are cyber attackers interested in your mobile devices?
 Your phone is a digital representation of your life
 If attackers can mimic your life they can put your identity and
your workplace at risk
 How can my device be hacked?
 Theft
 Risky apps
 How can I protect myself & kids?
 Lock your phone
 Use non-guessable passwords
 Beware of free apps
 Always check app permissions

18
For more graphics and stats:
http://www.veracode.com/blog/category/infographics

19

More Related Content

What's hot

Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 

What's hot (20)

Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application
 
Risks in the Software Supply Chain
Risks in the Software Supply ChainRisks in the Software Supply Chain
Risks in the Software Supply Chain
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
The AppSec Path to Enlightenment
The AppSec Path to EnlightenmentThe AppSec Path to Enlightenment
The AppSec Path to Enlightenment
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics Report
 
OWASP: Building Secure Web Apps
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Apps
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Facts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To KnowFacts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To Know
 

Viewers also liked

Mobile apps & digital marketing for restaurants
Mobile apps & digital marketing for restaurantsMobile apps & digital marketing for restaurants
Mobile apps & digital marketing for restaurants
PiTechnologies
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
xtin101
 

Viewers also liked (7)

Mobile Apps, Digital Solutions for Real Estate
Mobile Apps, Digital Solutions for Real EstateMobile Apps, Digital Solutions for Real Estate
Mobile Apps, Digital Solutions for Real Estate
 
BPM case studies
BPM case studiesBPM case studies
BPM case studies
 
Mobile apps & digital marketing for restaurants
Mobile apps & digital marketing for restaurantsMobile apps & digital marketing for restaurants
Mobile apps & digital marketing for restaurants
 
Mobile Apps Portfolio Supertron Infotech
Mobile Apps Portfolio Supertron InfotechMobile Apps Portfolio Supertron Infotech
Mobile Apps Portfolio Supertron Infotech
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
Apps for Librarians: Digital Literacy with Mobile Apps
Apps for Librarians: Digital Literacy with Mobile AppsApps for Librarians: Digital Literacy with Mobile Apps
Apps for Librarians: Digital Literacy with Mobile Apps
 

Similar to Mobile Security: Apps are our digital lives.

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Info-Tech Research Group
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
itnewsafrica
 
Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020
Allied Market Research
 

Similar to Mobile Security: Apps are our digital lives. (20)

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Mobile app developers |Veltrod
Mobile app developers |VeltrodMobile app developers |Veltrod
Mobile app developers |Veltrod
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
Advaiya enterprise mobility whitepaper
Advaiya enterprise mobility whitepaperAdvaiya enterprise mobility whitepaper
Advaiya enterprise mobility whitepaper
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
Leveraging B2B mobile apps
Leveraging B2B mobile appsLeveraging B2B mobile apps
Leveraging B2B mobile apps
 
How machine learning is usefull in mobile app development
How machine learning is usefull in mobile app development How machine learning is usefull in mobile app development
How machine learning is usefull in mobile app development
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
An overview of new age location-based apps and their development procedure!
An overview of new age location-based apps and their development procedure!An overview of new age location-based apps and their development procedure!
An overview of new age location-based apps and their development procedure!
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Mobile Security: Apps are our digital lives.